You are on page 1of 3

Assignment Tasks All working must be shown for numerical problems. 1.

2 points: Compare and contrast the go-back-N recovery method with the selective retransmission error recovery method. 2. Error detection is of the most crucial importance for network users. a. 1 point: Propose a generator. b. 1 point: c. 1 point: Show the whole message sent by the sender. 3. 3 points: Define, compare and contrast the sliding window protocol with the stop-and-wait protocol. 4. 2 points: Consider sending an object of size M = 100 Kbytes from server to client. Let S = 536 bytes and RTT = 100 msec. Suppose the transport protocol uses static windows with window size W. a. For a transmission rate of 28kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency. b. Repeat a) for 100 kbps. c. Repeat a) for 1 Mbps. d. Repeat a) for 10 Mbps 5. 3 points: Consider a broadcast channel with N nodes and a transmission rate of R bps. Suppose the broadcast channel uses polling (with an additional polling node) for multiple accesses. Suppose the amount of time from when a node completes transmission until the subsequent node is permitted to transmit (that is, the polling delay) is tpoll. Suppose that within a polling round, a given node is allowed to transmit at most Q bits. What is the maximum throughput of the broadcast channel? 6. 2 points: Describe the operation of the IEEE 802.3 medium access control protocol. Identify and discuss the features of this protocol that allow it to perform well during traffic bursts. 7. Define frequency-division-multiplexing (FDM) and time-division-multiplexing (TDM). a. 1 point: Compare and contrast FDM and TDM. b. 1 point: What advantages does TDM have over FDM in a circuit-switched network? 8. You are to design a LAN for the factory layout shown below.

You work for a company that designs LANs. Your manager has allocated the following project to you: Design a LAN for the factory layout that is shown in the figure. Your company received the following design requirements: All resources are shared. This means that each department must have access to the resources of all other departments. Traffic must be localized. This means that the traffic generated by users of one department cannot affect another department's LAN unless accessing a resource on that other department's LAN. File services are important to the factory; however, the file server can support only 30 users. Remember: file servers may not be shared by multiple departments. All repeaters, bridges, and hubs must reside in the wiring closets (WC's). Cables cost. Thus, you must use thin coax (no UTP) and, if deemed necessary, fibre optics.

Your tasks are as follows: a. 2 points: Provide a diagram for your design. b. 3 points: Provide a list of the equipment you use (with quantities) and the total cost of the LAN. c. 2 points: Repeat (b), but use UTP (no thin coax) and, if deemed necessary, fibre optics. 2 points: What does it mean for a wireless network to be operating in infrastructure mode? If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode? 3 points: Encryption is very important. a. The task is to encrypt a plaintext message using polyalphabetic encryption. For this purpose you should use two Caesar ciphers, with two keys k = 4, k = 12, and the repeating pattern C1, C2, C1, C1, C2. The message is as follows: Computer networks are important to business b. Which elements of this encryption must be treated securely? 2 points: Define, compare and contrast key management in systems that exploit symmetric encryption with systems that exploit public key encryption. Digital signatures a. 1 point: Explain the reasons for using message digests in signing messages. b. 1 point: Compare and contrast signing long messages with and without message digests. You have been commissioned by the CEO of a business to build a new network to support its two branches, one in Victoria and one in Queensland. The CEO has asked that all traffic between the two branches and within each branch be monitored. The CEO claims it is so that employees do not use the network for purposes other than work. Based on this description, discuss: a. 3 points: What legal issues exist for such a network in respect to the CEOs requirements? b. 3 points: What must be specified to satisfy the CEOs requirements? c. 1 point: If an existing employee claims this is a violation of privacy, does the employe have a case?

9.

10.

11. 12.

13.

d. 1 point: If the branches were in different states of Australia, would the implications change?

You might also like